Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Cyber Security Strategy, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Data Security
- Status: Free Trial
University of Minnesota
Skills you'll gain: Software Design Patterns, Software Design, Engineering Software, Software Quality Assurance, Software Engineering, Program Development, Application Security, Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Development Testing, Threat Modeling, Maintainability, Development Environment, Code Review, Application Deployment, Test Tools, Continuous Deployment, Quality Assurance, Continuous Delivery
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Bash (Scripting Language), Linux, Debugging, Cybersecurity
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Information Management, Security Awareness, Personally Identifiable Information, Cloud Security, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Cryptography, Health Policy, Information Privacy, Regulatory Compliance, Cloud Computing, Patient Safety
- Status: Free Trial
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
The University of Hong Kong
Skills you'll gain: Infectious Diseases, Epidemiology, Public Health and Disease Prevention, Public Health, Healthcare Ethics, Emergency Response, Research, Microbiology, Risk Analysis, Media and Communications, Molecular, Cellular, and Microbiology
- Status: Free Trial
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, Cyber Governance, System Monitoring, Network Security
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Business Continuity, System Monitoring, Verification And Validation, Technical Communication
- Status: Free Trial
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Safety and Security, Telehealth, Information Privacy, General Data Protection Regulation (GDPR)
- Status: Free Trial
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Threat Management, Vulnerability Assessments, General Networking, Windows PowerShell, Cyber Governance, Microsoft Windows, Virtual Machines
- Status: Free Trial
Cisco Learning and Certifications
Skills you'll gain: Threat Modeling, Threat Detection, Cyber Operations, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Event Monitoring, Network Monitoring, Automation
In summary, here are 10 of our most popular cyber threat hunting courses
- Ciberseguridad:Â Universidad de los Andes
- Engineering Practices for Building Quality Software:Â University of Minnesota
- Cybersécurité Google: Google
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University
- Network Security:Â ISC2
- Epidemics:Â The University of Hong Kong
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- Stages of Incident Response:Â Infosec
- API Security on Google Cloud's Apigee API Platform:Â Google Cloud
- Cybersecurity in Healthcare (Hospitals & Care Centres):Â Erasmus University Rotterdam